Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...


Cisco's implementation of ISDN BRI has multi protocol support,

SNMP MIB support, and what other features?

A.) Call waiting

B.) Compression

C.) ADSL

D.) 1.544 Mbps

E.) Call screening

F.) Negative 'G' support



Cisco's implementation of ISDN BRI has multi protocol support, SNMP MIB support, and what ot..

Answer / guest

Answer: B E

Caller ID is part of ISDN and you can screen calls based on it.

Cisco can compress with Stacker or Predictor.

Is This Answer Correct ?    0 Yes 0 No

Post New Answer

More CCNA Interview Questions

What is an autonomous system?

0 Answers  


Does a bridge divide a network into smaller segments?

0 Answers  


Identify the statement which connects access-list 101 inbound to interface e0? A.) Router(config-if)# ip access-group 101 in B.) Router(config-if)# ip access-group 101 C.) Router(config)# ip access-group 101 e0 in D.) Router(config)# ip access-group 101 e0 in

1 Answers  


What is the size of IP address?

0 Answers  


When using access lists, it is important where those access lists are placed. Which statement best describes access list placement? A. Put standard access lists as near the destination as possible. Put extended access lists as close to the source as possible. B. Put extended access lists as near the destination as possible. Put standard access lists as close to the source as possible. C. It isn't import where access lists are placed since the router will read and cache the whole list. D. Put access lists as close to corporate headquarters as possible.

1 Answers  


7. What is an advantage to using switches in your network? A. Addressing of hosts by DHCP B. Ease of administration C. Stops broadcast storms D. Works like a repeater

2 Answers   iGate,


in stead of 0.0.0.0 wild card mask what u can write after ip?

0 Answers  


What is the last step in data encapsulation? A.) User information is converted into data. B.) Segments are converted into datagrams and packets. C.) Frames are put into bits. D.) Data is converted into segments. E.) Packets are put into logical frame.

2 Answers  


What is the size of hello packets in eigrep protocol?

0 Answers  


Can you explain static and dynamic tunnels?

0 Answers   CCIE,


Which type of Ethernet framing is used for TCP/IP and DECnet? A. Ethernet 802.3 B. Ethernet 802.2 C. Ethernet II D. Ethernet SNAP

1 Answers  


Identify the purpose of the wildcard mask? A.) Match a certain portion of the IP address while ignoring the rest of the address B.) Determine the class of the IP address C.) Determine the network portion of an IP address D.) Hide the host portion of an IP address

1 Answers  


Categories